<img src="https://ad.doubleclick.net/ddm/activity/src=9826842;type=pagev0;cat=allsi0;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1?" width="1" height="1" alt="">

Security for enterprise IT infrastructure is essential, but with the on-going industrial digital transformation underway in many OT environments, maintaining system availability and the ability to operate is mission critical. Security, availability, and ability to operate for IT and OT cannot be separated as one can affect the other.

There are some similarities between IT and OT regarding some operating systems, technologies, and networks. However, the somewhat proprietary nature of OT-specific technologies, network protocols, and architecture make it harder for threat groups and cybercriminals to find ways to impact a victim's OT environment. If adversaries aim to disrupt an industrial organization’s operations, the attacker might use easier ways to achieve their objectives by initially targeting the IT systems and network.

In this white paper, we discuss some of the many ways IT threats can impact OT operations to highlight the need for better IT/OT collaboration between IT operations teams and OT engineers.

SKIP